General

  • Target

    ec667c42221a498e3565986360fed666a379671fb279f4fb442a89a054ea0093

  • Size

    12KB

  • Sample

    240522-zlh41agb66

  • MD5

    ac9c7da8a3ceb190eda4c1627360e0e0

  • SHA1

    8a0c76711c41d5d1c714f6ba73e28aa1e318313d

  • SHA256

    ec667c42221a498e3565986360fed666a379671fb279f4fb442a89a054ea0093

  • SHA512

    1f4583aecdfaeda0f26d46f9bbe071ba50167ae26c47133aa28e7c7671e8f41940e7aed3e6214160c14308d9afbfd04235f3b2b8de1ccd19e415511d5b0f11dc

  • SSDEEP

    192:9ZL29RBzDzeobchBj8JONTON9wruTrEPEjr7AhU:9529jnbcvYJOwIuTvr7CU

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      ec667c42221a498e3565986360fed666a379671fb279f4fb442a89a054ea0093

    • Size

      12KB

    • MD5

      ac9c7da8a3ceb190eda4c1627360e0e0

    • SHA1

      8a0c76711c41d5d1c714f6ba73e28aa1e318313d

    • SHA256

      ec667c42221a498e3565986360fed666a379671fb279f4fb442a89a054ea0093

    • SHA512

      1f4583aecdfaeda0f26d46f9bbe071ba50167ae26c47133aa28e7c7671e8f41940e7aed3e6214160c14308d9afbfd04235f3b2b8de1ccd19e415511d5b0f11dc

    • SSDEEP

      192:9ZL29RBzDzeobchBj8JONTON9wruTrEPEjr7AhU:9529jnbcvYJOwIuTvr7CU

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks